Advances in Computer Science and Information Technology: AST/UCMA/ISA/ACN 2010 Conferences, Miyazaki, Japan, June 23-25, 2010. Joint Proceedings

Overview

This book constitutes the refereed joint proceedings of four co-located international conferences, concertedly held in Miyazaki, Japan, in June
2010. The papers in this volume were selected based on their scores obtained from the independent reviewing processes at particular conferences, and their relevance to the idea of constructing hybrid solution to address the real-world challenges of IT. It provides a chance for academic and industry ...

See more details below
Paperback (2010)
$122.17
BN.com price
(Save 27%)$169.00 List Price
Other sellers (Paperback)
  • All (7) from $81.48   
  • New (5) from $81.48   
  • Used (2) from $84.1   
Sending request ...

Overview

This book constitutes the refereed joint proceedings of four co-located international conferences, concertedly held in Miyazaki, Japan, in June
2010. The papers in this volume were selected based on their scores obtained from the independent reviewing processes at particular conferences, and their relevance to the idea of constructing hybrid solution to address the real-world challenges of IT. It provides a chance for academic and industry professionals to catch up on recent progress in the related areas.

The 49 revised full papers presented were carefully reviewed and selected during two rounds of reviewing and improvement from more than
1000 initial submissions. The papers emanate from the four following international conferences: Information Security and Assurance (ISA
2010), Advanced Communication and Networking (ACN 2010), Advanced
Science and Technology (AST 2010), and Ubiquitous Computing and
Multimedia Applications (UCMA 2010). This volume focuses on various aspects of advance

Read More Show Less

Product Details

Table of Contents

Information Security and Assurance

Fuzzy Based Threat Analysis in Total Hospital Information System 1

Au ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard Model Azizah Abdul Manaf Manaf, Azizah Abdul 15

A Supervised Locality Preserving Projections Based Local Matching Algorithm for Face Recognition Qiuliang Xu Xu, Qiuliang 28

Information Systems Security Criticality and Assurance Evaluation Shuyan Wang Wang, Shuyan 38

Security Analysis of 'Two Factor User Authentication in Wireless Sensor Networks' Djamel Khadraoui Khadraoui, Djamel 55

Directed Graph Pattern Synthesis in LSB Technique on Video Steganography Khaled Alghathbar Alghathbar, Khaled 61

Feature Level Fusion of Face and Palmprint Biometrics by Isomorphic Graph-Based Improved K-Medoids Partitioning Tai-hoon Kim Kim, Tai-hoon 70

Post-quantum Cryptography: Code-Based Signatures Jamuna Kanta Sing Sing, Jamuna Kanta 82

Security Analysis of the Proposed Practical Security Mechanisms for High Speed Data Transfer Protocol Mohammed Meziani Meziani, Mohammed 100

A Fuzzy-Based Dynamic Provision Approach for Virtualized Network Intrusion Detection Systems Doan Hoang Hoang, Doan 115

An Active Intrusion Detection System for LAN Specific Attacks Wantao Liu Liu, Wantao 129

Analysis on the Improved SVD-Based Watermarking Scheme Vivek Ramachandran Ramachandran, Vivek 143

Advanced Communication and Networking Swee-Huay Heng Heng, Swee-Huay

Applications of Adaptive Belief Propagation Decoding for Long Reed-Solomon Codes Swee-Huay Heng Heng, Swee-Huay 150

Dynamic Routing for Mitigating the Energy Hole Based on Heuristic Mobile Sink in Wireless Sensor Networks Tomohisa Wada Wada, Tomohisa 159

Grammar Encoding in DNA-Like Secret Sharing Infrastructure Jung-Hyun Lee Lee, Jung-Hyun 175

HATS: High Accuracy Timestamping System Based on NetFPGA Urszula Ogiela Ogiela, Urszula 183

A Roadside Unit Placement Scheme for Vehicular Telematics Networks Xing Li Xing, Li 196

Concurrent Covert Communication Channels Cheol Min Kim Kim, Cheol Min 203

Energy Efficiency of Collaborative Communication with Imperfect Frequency Synchronization in Wireless Sensor Networks Yoojin Chung Chung, Yoojin 214

High Performance MAC Architecture for 3GPP Modem Zorn Salcic Salcic, Zorn 228

Modified Structures of Viterbi Alogrithm for Forced-State Method in Concatenated Coding System of ISDB-T Kyungho Kim Kim, Kyungho 239

A New Cross-Layer Unstructured P2P File Sharing Protocol Over Mobile Ad Hoc Network Tomohisa Wada Wada, Tomohisa 250

A Model for Interference on Links in Inter-Working Multi-Hop Wireless Networks Depei Qian Qian, Depei 264

An Optimum ICA Based Multiuser Data Separation for Short Message Service H. Anthony Chan Chan, H. Anthony 279

Advanced Computer Science and Information Technology Katsumi Yamashita Yamashita, Katsumi

Multiple Asynchronous Requests on a Client-Based Mashup Page Katsumi Yamashita Yamashita, Katsumi 287

Using an Integrated Ontology Database to Categorize Web Pages Kyung-Jin Seo Seo, Kyung-Jin 300

Topic Detection by Topic Model Induced Distance Using Biased Initiation Junhua Liao Liao, Junhua 310

Mining Significant Least Association Rules Using Fast SLP-Growth Algorithm Jun Xu Jun, Xu 324

Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face Recognition Mustafa Mat Dens Dens, Mustafa Mat 337

Agent Based Approach to Regression Testing Massimo Tistarelli Tistarelli, Massimo 345

A Numerical Study on B&B Algorithms for Solving Sum-Of-Ratios Problem Tai-hoon Kim Kim, Tai-hoon 356

Development of a Digital Textbook Standard Format Based on XML Jianming Shi Shi, Jianming 363

A Pattern-Based Representation Approach for Online Discourses Jae-Soo Yoo Yoo, Jae-Soo 378

A Fault Tolerant Architecture for Transportation Information Services of E-Government Hao Xu Hao, Xu 385

Design and Implementation of Binary Tree Based Proactive RoutingProtocols for Large MANETS Eunseok Lee Lee, Eunseok 397

Extract Semantic Information from WordNet to Improve Text Classification Performance G.P. Biswas Biswas, G. P. 409

Managing Ubiquitous Scientific Knowledge on Semantic Web Junhua Liao Liao, Junhua 421

A Semantic Pattern Approach to Managing Scientific Publications Hao Xu Hao, Xu 431

A Bootstrap Software Reliability Assessment Method to Squeeze Out Remaining Faults Hao Xu Hao, Xu 435

Markov Chain Monte Carlo Random Testing Takaji Pujiwara Pujiwara, Takaji 447

An Integrated Approach to Detect Fault-Prone Modules Using Complexity and Text Feature Metrics Tadashi Dohi Dohi, Tadashi 457

Ubiquitous Computing and Multimedia Applications Hideaki Hata Hata, Hideaki

An Effective Video Steganography Method for Biometric Identification Hideaki Hata Hata, Hideaki 469

A Video Coding Technique using Octagonal Motion Search and BTC-PF Method for Fast Reconstruction Miao Qi Miao, Qi 480

Rough Set Approach in Ultrasound Biomicroscopy Glaucoma Analysis Bhabatosh Chanda Chanda, Bhabatosh 491

Video Copy Detection: Sequence Matching Using Hypothesis Test Aboul Ella Hassanien Hassanien, Aboul Ella 499

An XML-Based Digital Textbook and Its Educational Effectiveness Bhabatosh Chanda Chanda, Bhabatosh 509

SIMACT: A 3D Open Source Smart Home Simulator for Activity Recognition Namgyun Kim Kim, Namgyun 524

Design of an Efficient Message Collecting Scheme for the Slot-Based Wireless Mesh Network Abdenour Bouzouane Bouzouane, Abdenour 534

A Novel Approach Based on Fault Tolerance and Recursive Segmentation to Query by Humming Gyung-Leen Park Park, Gyung-Leen 544

Chinese Prosody Generation Based on C-ToBI Representation for Text-To-Speech Xiaolong Wang Wang, Xiaolong 558

CAS4UA: A Context-Aware Service System Based on Workflow Model for Ubiquitous Agriculture Byeongchang Kim Kim, Byeongchang 572

A Power Control Scheme for an Energy-Efficient MAC Protocol Haeng-Kon Kim Kim, Haeng-Kon 586

Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural Networks Hyun Yoe Yoe, Hyun 597

Author Index Abdullah S Alghamdi Alghamdi, Abdullah S 603

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)